Логотип exploitDog
bind:CVE-2025-27493
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-27493

Количество 3

Количество 3

nvd логотип

CVE-2025-27493

11 месяцев назад

A vulnerability has been identified in SiPass integrated AC5102 (ACC-G2) (All versions < V6.4.9), SiPass integrated ACC-AP (All versions < V6.4.9). Affected devices improperly sanitize user input for specific commands on the telnet command line interface. This could allow an authenticated local administrator to escalate privileges by injecting arbitrary commands that are executed with root privileges.

CVSS3: 8.2
EPSS: Низкий
github логотип

GHSA-vx36-4cp6-8qcp

11 месяцев назад

A vulnerability has been identified in SiPass integrated AC5102 (ACC-G2) (All versions < V6.4.9), SiPass integrated ACC-AP (All versions < V6.4.9). Affected devices improperly sanitize user input for specific commands on the telnet command line interface. This could allow an authenticated local administrator to escalate privileges by injecting arbitrary commands that are executed with root privileges.

CVSS3: 8.2
EPSS: Низкий
fstec логотип

BDU:2025-02898

11 месяцев назад

Уязвимость интерфейса командной строки telnet интегрированных контроллеров IP-доступа SiPass, позволяющая нарушителю выполнить произвольные команды и получить несанкционированный доступ к защищаемой информации

CVSS3: 8.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-27493

A vulnerability has been identified in SiPass integrated AC5102 (ACC-G2) (All versions < V6.4.9), SiPass integrated ACC-AP (All versions < V6.4.9). Affected devices improperly sanitize user input for specific commands on the telnet command line interface. This could allow an authenticated local administrator to escalate privileges by injecting arbitrary commands that are executed with root privileges.

CVSS3: 8.2
0%
Низкий
11 месяцев назад
github логотип
GHSA-vx36-4cp6-8qcp

A vulnerability has been identified in SiPass integrated AC5102 (ACC-G2) (All versions < V6.4.9), SiPass integrated ACC-AP (All versions < V6.4.9). Affected devices improperly sanitize user input for specific commands on the telnet command line interface. This could allow an authenticated local administrator to escalate privileges by injecting arbitrary commands that are executed with root privileges.

CVSS3: 8.2
0%
Низкий
11 месяцев назад
fstec логотип
BDU:2025-02898

Уязвимость интерфейса командной строки telnet интегрированных контроллеров IP-доступа SiPass, позволяющая нарушителю выполнить произвольные команды и получить несанкционированный доступ к защищаемой информации

CVSS3: 8.2
0%
Низкий
11 месяцев назад

Уязвимостей на страницу